Hostname: page-component-cd9895bd7-fscjk Total loading time: 0 Render date: 2024-12-22T22:44:31.637Z Has data issue: false hasContentIssue false

Submit content

Help address this Question with your content Submit Content

What are the full capabilities of relativistic quantum cryptography?

Published online by Cambridge University Press:  14 October 2022

Carl A. Miller*
Affiliation:
Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD, USA
*
Author for correspondence: Carl A. Miller, Email: [email protected]
Rights & Permissions [Opens in a new window]

Extract

Quantum cryptography bases its security proofs on physical assumptions. A longstanding observation in the field is that we may be able to do more cryptographic tasks when we assume not only the laws of quantum mechanics but also the impossibility of superluminal signaling (i.e., that information cannot travel faster than the speed of light). Relativistic quantum cryptography takes into account the spatial locations of the parties involved and uses the impossibility of superluminal signaling as a basis for security. Previous efforts in this field have been fruitful, both theoretically and experimentally.

Type
Question
Creative Commons
Creative Common License - CCCreative Common License - BY
This is a work of the US Government and is not subject to copyright protection within the United States. Published by Cambridge University Press.
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© National Institute of Standards and Technology, 2022.

Quantum cryptography bases its security proofs on physical assumptions. A longstanding observation in the field is that we may be able to do more cryptographic tasks when we assume not only the laws of quantum mechanics but also the impossibility of superluminal signaling (i.e., that information cannot travel faster than the speed of light). Relativistic quantum cryptography takes into account the spatial locations of the parties involved and uses the impossibility of superluminal signaling as a basis for security. Previous efforts in this field have been fruitful, both theoretically and experimentally.

The goal of this research direction is to map out the full range of cryptography that can be carried out in a relativistic quantum setting. Two important threads are:

  1. 1. How can relativistic quantum cryptography be used to improve the security of positioning, navigation, and timing technologies?

  2. 2. How can relativistic quantum cryptography be used to better accomplish cryptographic tasks in a two-party setting (such as coin flipping, bit commitment, and oblivious transfer)?